File tree Expand file tree Collapse file tree 1 file changed +59
-0
lines changed Expand file tree Collapse file tree 1 file changed +59
-0
lines changed Original file line number Diff line number Diff line change @@ -187237,6 +187237,65 @@
187237
187237
"session_types": false,
187238
187238
"needs_cleanup": null
187239
187239
},
187240
+ "exploit_windows/scada/mypro_cmdexe": {
187241
+ "name": "mySCADA MyPRO Authenticated Command Injection (CVE-2023-28384)",
187242
+ "fullname": "exploit/windows/scada/mypro_cmdexe",
187243
+ "aliases": [
187244
+
187245
+ ],
187246
+ "rank": 600,
187247
+ "disclosure_date": "2022-09-22",
187248
+ "type": "exploit",
187249
+ "author": [
187250
+ "Michael Heinzl"
187251
+ ],
187252
+ "description": "Authenticated Command Injection in MyPRO <= v8.28.0 from mySCADA.\n The vulnerability can be exploited by a remote attacker to inject arbitrary operating system commands which will get executed in the context of NT AUTHORITY\\SYSTEM.",
187253
+ "references": [
187254
+ "URL-https://www.cisa.gov/news-events/ics-advisories/icsa-23-096-06",
187255
+ "CVE-2023-28384"
187256
+ ],
187257
+ "platform": "Windows",
187258
+ "arch": "cmd",
187259
+ "rport": 80,
187260
+ "autofilter_ports": [
187261
+ 80,
187262
+ 8080,
187263
+ 443,
187264
+ 8000,
187265
+ 8888,
187266
+ 8880,
187267
+ 8008,
187268
+ 3000,
187269
+ 8443
187270
+ ],
187271
+ "autofilter_services": [
187272
+ "http",
187273
+ "https"
187274
+ ],
187275
+ "targets": [
187276
+ "Windows_Fetch"
187277
+ ],
187278
+ "mod_time": "2024-07-25 23:54:27 +0000",
187279
+ "path": "/modules/exploits/windows/scada/mypro_cmdexe.rb",
187280
+ "is_install_path": true,
187281
+ "ref_name": "windows/scada/mypro_cmdexe",
187282
+ "check": true,
187283
+ "post_auth": true,
187284
+ "default_credential": false,
187285
+ "notes": {
187286
+ "Stability": [
187287
+ "crash-safe"
187288
+ ],
187289
+ "Reliability": [
187290
+ "repeatable-session"
187291
+ ],
187292
+ "SideEffects": [
187293
+ "ioc-in-logs"
187294
+ ]
187295
+ },
187296
+ "session_types": false,
187297
+ "needs_cleanup": null
187298
+ },
187240
187299
"exploit_windows/scada/procyon_core_server": {
187241
187300
"name": "Procyon Core Server HMI Coreservice.exe Stack Buffer Overflow",
187242
187301
"fullname": "exploit/windows/scada/procyon_core_server",
You can’t perform that action at this time.
0 commit comments